Abstract:
An apparatus and methods are provided for automatically detecting and connecting to a Wi-Fi network. In these methods, a wireless device listens for beacons that are sent using a low-power wireless protocol. Once the wireless device detects a first beacon at a first location, the wireless device extracts a first beacon region identifier from the beacon and correlates the first beacon region identifier with a first Wi-Fi network that is located at the first location. Next, the wireless device retrieves a first set of credentials for connecting to the first Wi-Fi network. Once the first set of credentials is retrieved, the wireless device uses the first set of credentials to connect to the first Wi-Fi network.
Abstract:
A wireless device configured to delegate it communications and traffic monitoring tasks to a paired device when a wireless transceiver of the wireless device is found to be in an idle state is provided. The wireless device includes two wireless transceivers, the first wireless transceiver for communicating with a wireless access point and second low power wireless transceiver for communicating with a paired device. When the wireless device determines that the first wireless transceiver is in an idle state, it can place the first wireless transceiver into a sleep mode and delegate to the paired device via the second wireless transceiver communication and traffic monitoring tasks that would have been performed by the first wireless transceiver if it were not in a sleep mode.
Abstract:
Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a measurement request and a first random identifier from a first wireless communication device at a second wireless communication device. The embodiments also includes deriving a transient key using the first random identifier, a second random identifier (generated by the second device), and a pre-shared key. The first and second random identifiers, the pre-shared key, and the transient key derived therefrom are shared between the first and second devices, but are not known to any other devices. The embodiments further include encrypting measurement data exchanged between the two devices using the transient key, and using the encrypted measurement data to calculate and verify a separation distance between the devices. The embodiments thus prevent dishonest wireless communication devices from intercepting communications and spoofing a location of one of the two honest devices.
Abstract:
Apparatus and methods for configuring wireless circuitry of a wireless device to optimize power consumption based on operating states of the wireless device are disclosed. When associating with or while associated with a multiple-input multiple-output (MIMO) capable wireless local area network (WLAN) access point (AP), the wireless device configures the wireless circuitry to use a MIMO mode that includes at least two spatial streams for communication with multiple radio frequency (RF) receive chains active, a single-input single-output (SISO) mode or a multiple-input single-output (MISO) mode that includes only one spatial stream and a single RF receive chain active, or a single-input multiple-output (SIMO) mode that includes only one spatial stream and multiple RF receive chains active, based on balancing application requirements for data throughput with power saving modes to conserve battery levels. MIMO modes can be used when an active application benefits from MIMO rates or when transferring large files.
Abstract:
A method and wireless station used to perform WiFi scans. The wireless station determines a first cell identity of a first cell to which the wireless station is currently connected, determines a second cell identity of a second cell that is available, determines whether either of the first or second cell identities are related to a WiFi network based on relationships between cell identities and WiFi networks stored in the wireless station, performs a first type of scan for available WiFi networks when either of the first cell identity or the second cell identity is related to the WiFi network and performs a second type of scan for available WiFi networks when neither of the first cell identity or the second cell identity is related to the WiFi network, the first type of scan is performed more frequently or over more channels compared to the second type of scan.
Abstract:
Embodiments for securely determining a separation distance between wireless communication devices is provided. These embodiments include receiving a measurement request and a first random identifier from a first wireless communication device at a second wireless communication device. The embodiments also includes deriving a transient key using the first random identifier, a second random identifier (generated by the second device), and a pre-shared key. The first and second random identifiers, the pre-shared key, and the transient key derived therefrom are shared between the first and second devices, but are not known to any other devices. The embodiments further include encrypting measurement data exchanged between the two devices using the transient key, and using the encrypted measurement data to calculate and verify a separation distance between the devices. The embodiments thus prevent dishonest wireless communication devices from intercepting communications and spoofing a location of one of the two honest devices.
Abstract:
After detecting an access-intent operation, an electronic device establishes a connection with a second electronic device using a communication protocol. The electronic devices exchange identifiers, and the second electronic device provides information specifying a preferred channel to use with a second communication protocol. Based at least in part on the preferred channel of the second electronic device and on communication contexts of the electronic devices, the electronic device selects a channel and transmits to the second electronic device information specifying the selected channel. The electronic device remotely accesses credential information based on the exchanged identifiers, and using the credential information, the electronic devices establish a secure connection via the selected channel using the second communication protocol. The electronic device determines a distance to the second electronic device using wireless ranging via the secure connection. When the electronic devices are proximate to each other, the electronic device can be unlocked.
Abstract:
Apparatus and methods for configuring wireless circuitry of a wireless communication device associated with a wireless local area network (WLAN) access point (AP) to use a reduced power consumption mode are disclosed. While associated with a multiple-input multiple-output (MIMO) WLAN AP and operating in a MIMO mode that includes at least two spatial streams for communication with multiple radio frequency (RF) receive chains active, the wireless communication device transmits a message indicating a request to use a spatial multiplexing power save (SMPS) mode that supports only one spatial stream and requires only a single active RF receive chain. The wireless communication device monitors packets received from the WLAN AP after a guard interval following the request and only switches to the SMPS mode when all packets received after the guard interval use only one spatial stream.
Abstract:
A method automatically connects a device to a WiFi network. The method includes determining WiFi networks that are available for a connection thereto. The method includes categorizing each of the WiFi networks as a private WiFi network or a public WiFi network in which the private WiFi network utilizes a first association process while the public WiFi network utilizes a second association process. The method includes executing a first automatic connection process using the first association process until a successful connection is established to one of the private WiFi networks based upon a first prioritized list. The method includes executing a second automatic connection process until a successful connection is established to one of the public WiFi networks based upon a second prioritized list when the first automatic connection process to the private wireless networks is unsuccessful.
Abstract:
Embodiments provide a technique for enabling a wireless device to operate in a power saving mode without completely cutting off the wireless device from receiving outside communications. The technique includes, at an access point (AP), generating traffic indication map (TIM) information that indicates whether downlink data directed to the wireless device is buffered at the AP. The AP precedes a beacon frame with at least one “lightweight” traffic indication map (TIM) frame that includes the TIM information, which is a subset of the information that is included in the beacon frame. The AP can be configured to transmit the TIM broadcast frame, the beacon frame, and any other frames that include the TIM information during a single transmit opportunity to reduce the number of instances where the wireless device is required to transition from an idle state to a listen state.